CVE Vulnerabilities

CVE-2014-0017

Published: Mar 14, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
1.9 LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Affected Software

NameVendorStart VersionEnd Version
LibsshLibssh*0.6.2 (including)
LibsshLibssh0.4.7 (including)0.4.7 (including)
LibsshLibssh0.4.8 (including)0.4.8 (including)
LibsshLibssh0.5.0 (including)0.5.0 (including)
LibsshLibssh0.5.0-rc1 (including)0.5.0-rc1 (including)
LibsshLibssh0.5.1 (including)0.5.1 (including)
LibsshLibssh0.5.2 (including)0.5.2 (including)
LibsshLibssh0.5.3 (including)0.5.3 (including)
LibsshLibssh0.5.4 (including)0.5.4 (including)
LibsshLibssh0.5.5 (including)0.5.5 (including)
LibsshLibssh0.6.0 (including)0.6.0 (including)
LibsshLibssh0.6.1 (including)0.6.1 (including)
LibsshUbuntudevel*
LibsshUbuntulucid*
LibsshUbuntuprecise*
LibsshUbuntuquantal*
LibsshUbuntusaucy*
LibsshUbuntuupstream*

References